SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, 2009 1:30 pm –

Slides:



Advertisements
Similar presentations
MCT620 – Distributed Systems
Advertisements

Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Ethernet Switch Features Important to EtherNet/IP
Overview of IETF work on IP traffic flow measurement and current developments Dr. Jürgen Quittek General Manager Network Research Division, NEC Europe.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Student Guide Access List.
1 EE 122: Networks Performance & Modeling Ion Stoica TAs: Junda Liu, DK Moon, David Zats (Materials with thanks.
Chapter 1: Introduction to Scaling Networks
Local Area Networks - Internetworking
Traffic Analyst Complete Network Visibility. © 2013 Impact Technologies Inc., All Rights ReservedSlide 2 Capacity Calibration Definitive Requirements.
Configuring and Troubleshooting ACLs
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
ICmyNet.Flow Network Traffic Analysis System If You Want to See Your Net
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Enhancing Spotfire with the Power of R
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 Expose VoIP Problems With Wireshark June 15, 2010 Sean Walberg Vantage Media SHARKFEST ‘10 Stanford.
$1 Million $500,000 $250,000 $125,000 $64,000 $32,000 $16,000 $8,000 $4,000 $2,000 $1,000 $500 $300 $200 $100 Welcome.
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 Exposing VoIP problems with Wireshark April 2, 2008 Sean Walberg Network Guy | Canwest SHARKFEST.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
1 SMART Training S - Setup M - Measurement A - Analysis RT - ReporT.
Introduction to Network Analysis and Sniffer Pro
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 TAP’s Demystified June 16 th 2010 Samuel Battaglia Technical Manager | Network Critical SHARKFEST.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Net Optics Confidential and Proprietary Director xStream Intelligent Access and Monitoring Architecture Solutions.
Introduction. 2 What Is SmartFlow? SmartFlow is the first application to test QoS and analyze the performance and behavior of the new breed of policy-based.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Document Number IPN West Diamond Avenue - Third Floor, Gaithersburg, MD Phone: (301) Fax: (301)
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
GigE Knowledge. BODE, Company Profile Page: 2 Table of contents  GigE Benefits  Network Card and Jumbo Frames  Camera - IP address obtainment  Multi.
Net Optics, Inc. - Proprietary Director Pro™ Overview February 2010.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
Interior Gateway Routing Protocol (IGRP) is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing.
OSI Model Routing Connection-oriented/Connectionless Network Services.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Document Number ETH West Diamond Avenue - Third Floor, Gaithersburg, MD Phone: (301) Fax: (301)
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
Networking Functions of windows NT Sever
Introduction to Wireshark Making Sense of the Matrix
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.2: Using NBAR for Classification.
Net Optics Confidential and Proprietary iLink Agg xStream Intelligent Access and Monitoring Architecture Solutions.
Smart Switches FS526T / FS750T / GS748T / GS724T
Vladimír Smotlacha CESNET Full Packet Monitoring Sensors: Hardware and Software Challenges.
EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL CHAPPELLU.COM WIRESHARKTRAINING.COM.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Project Requirements (NetFlow Generator) 정승화 분산 처리 및 네트워크 관리 연구실 포항 공과 대학교
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
POSTECH 1/39 CSED702D: Internet Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Challenges and  Goal: remove critical stuff remove critical stuff but: keep enough info to stay useful but: keep enough info to stay.
Cisco Study Guide
Ethernet Packet Filtering – Part 2 Øyvind Holmeide 10/28/2014 by.
Advanced Network Tap application for
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
RMON.
Chapter 4 Data Link Layer Switching
Wireshark CSC8510 David Sivieri.
Network Analyzer :- Introduction to Wireshark
Presentation transcript:

SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, :30 pm – 3:00 pm

SHARKFEST '09 | Stanford University | June 15–18, 2009 Overview What are the challenges of managing 10 Gig links? How can we overcome these challenges? How can I use WireShark at 10 Gig? SmartNA 10G Filtering Aggregating TAP

SHARKFEST '09 | Stanford University | June 15–18, Gbps is a LOT of Data 10,000,000,000 bps – Ten billion bits per second ~2.4 Million packets per second of 1,024 byte packets – 1,197,000+ per direction ~29 Million packets per second of 64 byte packets – 14,880,000+ packets per second per direction

SHARKFEST '09 | Stanford University | June 15–18, 2009 Challenges and Limitations Capture devices do not keep up with 10G traffic – Limited capture bandwidth – Custom NICs are EXPENSIVE and still dropping packets under load – No real-time information 10G monitoring tools are very expensive – e.g. ranging from $50K to $150K and beyond

SHARKFEST '09 | Stanford University | June 15–18, 2009 WireShark on a Laptop? … Good, But WireShark on a laptop is invaluable But performance of receive, capture and analysis is limited 10Gbps link would exhaust the memory in a second … Not strong enough to sustain capturing and analysis at high rate

SHARKFEST '09 | Stanford University | June 15–18, 2009 Simple and Effective Solution Limit your WireSharking to relevant traffic subset only Selectively filter according to header fields AND payload content as needed On-the-fly second by second visibility to network behavior and Key Performance Indicators Intuitive graphs and visualization

SHARKFEST '09 | Stanford University | June 15–18, 2009 How Well Do You Know Your Network? Are your 10G links fully utilized? – What types of traffic are dominant? – How about spikes and micro-bursts? Can you analyze every bit or event today? – How do you access data remotely? WireShark cant handle 10 Gbps of data "If you can not measure it, you can not improve it - Lord Kelvin

SHARKFEST '09 | Stanford University | June 15–18, 2009 How to Get the Relevant Traffic? Built-in access to network traffic is essential How do you pull out network traffic – TAP (traffic access point) – SPAN/mirror port But you need only the relevant network traffic … Feed WireShark only filtered traffic

SHARKFEST '09 | Stanford University | June 15–18, 2009 Flexible Filtering at 10 Gigabits Filter by: – MAC addresses – VLAN ranges – IP address ranges – Protocol types – QoS level – Port ranges – Advanced pattern matching (Layer 2-7)

SHARKFEST '09 | Stanford University | June 15–18, 2009 Easy-to-use, Exact, Guaranteed True parsing of the protocol header stack – Automatic header skipping Flexible Complete Packet Inspection filters – Non-anchored/anchored patterns – Case sensitive/insensitive searches Easy incremental provisioning – Simple browser form and a command line

SHARKFEST '09 | Stanford University | June 15–18, 2009 Flexible Filtering, Mirroring, Bandwidth Reduction Two 10Gbps full-duplex Data Interfaces (A and B) Two Transmit-only 10 Gbps Duplicate Interfaces (1 and 2) Two Transmit-only 1Gbps Duplicate Interfaces (3 and 4) Aggregation, reduction, time stamping ( S), and forwarding over UDP One management/configuration interface for provisioning and reports MONITORINGOUTPUTMANAGEMENT DISPLAY LINK/ACTIVITY STATUS POWER CONTROL PAD

SHARKFEST '09 | Stanford University | June 15–18, 2009 Key Features Smart TAP: Two 10 GigE data + two 10G dup + two 1G dup – Integrated fiber bypass - zero risk passive deployment in line Duplicating and filtering traffic to 10G and 1G smart ports – Bandwidth reduction and remote forwarding of specific traffic Selective filtering according to headers and payload patterns – True packet header parsing and pattern search anywhere in payload Microsecond accurate time stamp for delay & jitter analysis

SHARKFEST '09 | Stanford University | June 15–18, 2009 Key Features Visualization, aggregation, and correlation of performance info – Second by second network behavioral information – Performance metrics – not just raw packets Burst capture – Sample packets and retrieve as pcap from any web browser – Narrow down on specific packet types as necessary Detailed and 100% accurate counters of packets and bytes – Accurate performance break-down at one second resolution

SHARKFEST '09 | Stanford University | June 15–18, 2009 SmartNA TAP Deployment

SHARKFEST '09 | Stanford University | June 15–18, 2009 Performance Visualization and Behavioral Analysis Performance monitoring on-the-fly Aggregation, correlation, visualization Built-in and user-defined graphs Export data in CSV to Excel, SQL, … View remotely over web browser

SHARKFEST '09 | Stanford University | June 15–18, 2009 SmartNA 10G TAP Web-based reporting with detailed counters and statistics Current, statistical (min, max, mean, std dev), cumulative All counters accurate to the bit 30 Built-in profiles and 16 user-defined profiles Break down to major protocol groups, TCP events, TCP window sizes

SHARKFEST '09 | Stanford University | June 15–18, 2009 Example: Filtering & Duplicating Specific Traffic Example: filter incoming web traffic (from port 80) to subnet /24 and duplicate from Live Port A to Duplicate Port 1 – Open simple form by pointing Web browser to cTap management IP address – Define subnet filter is IPv4 destination by using CIDR mask ( /24) – Select TCP protocol from pull down and set sport to 80 – Activate filter and monitor rate of packets and bytes matching the profile

SHARKFEST '09 | Stanford University | June 15–18, 2009 Example: On-the-Fly Pattern Search at 10G Line Rate Simple web browser configuration Select string match template Set payload field to confidential Select IGNORECASE (case insensitive) Activate the filter Monitor rate of packets and bytes matching the profile

SHARKFEST '09 | Stanford University | June 15–18, 2009 Example: need to filter all packets with Confidential in payload based on pattern search